www.proofpoint.com
Open in
urlscan Pro
2a02:e980:107::cf
Public Scan
Submitted URL: http://www.proofpoint.com/au/events/protect
Effective URL: https://www.proofpoint.com/au/events/protect
Submission: On March 28 via api from IE — Scanned from DE
Effective URL: https://www.proofpoint.com/au/events/protect
Submission: On March 28 via api from IE — Scanned from DE
Form analysis
3 forms found in the DOM/au
<form action="/au" data-region="us" data-language="en">
<input type="text" name="search_block_form" placeholder="Search">
<input type="submit">
</form>
<form id="mktoForm_13526" data-mkto-id="13526" data-mkto-base="//app-abj.marketo.com" data-munchkin-id="309-RHV-619" data-submit-text="" data-redirect-link="https://www.proofpoint.com/uk/events/protect/thank-you" data-prefill="" data-event-label=""
class="mk-form__form marketo-form-block__form mktoForm mktoHasWidth mktoLayoutLeft js-visible mkto-form-processed" novalidate="novalidate" style="font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); width: 1601px;">
<style type="text/css"></style>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
<div class="mktoOffset" style="width: 5px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="FirstName" id="LblFirstName" class="mktoLabel mktoHasWidth" style="width: 150px;">
<div class="mktoAsterix">*</div>First Name
</label>
<div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="FirstName" name="FirstName" placeholder="First Name *" maxlength="255" aria-labelledby="LblFirstName InstructFirstName" type="text"
class="mktoField mktoTextField mktoHasWidth mktoRequired" aria-required="true" style="width: 150px;"><span id="InstructFirstName" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
<div class="mktoOffset" style="width: 5px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="LastName" id="LblLastName" class="mktoLabel mktoHasWidth" style="width: 150px;">
<div class="mktoAsterix">*</div>Last Name
</label>
<div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="LastName" name="LastName" placeholder="Last Name *" maxlength="255" aria-labelledby="LblLastName InstructLastName" type="text"
class="mktoField mktoTextField mktoHasWidth mktoRequired" aria-required="true" style="width: 150px;"><span id="InstructLastName" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
<div class="mktoOffset" style="width: 5px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 150px;">
<div class="mktoAsterix">*</div>Business Email
</label>
<div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="Email" name="Email" placeholder="Business Email *" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email"
class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 150px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
<div class="mktoOffset" style="width: 5px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="Company" id="LblCompany" class="mktoLabel mktoHasWidth" style="width: 150px;">
<div class="mktoAsterix">*</div>Company Name
</label>
<div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="Company" name="Company" placeholder="Company Name *" maxlength="255" aria-labelledby="LblCompany InstructCompany" type="text"
class="mktoField mktoTextField mktoHasWidth mktoRequired" aria-required="true" style="width: 150px;" value="Lake Solutions AG"><span id="InstructCompany" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
<div class="mktoOffset" style="width: 5px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="Title" id="LblTitle" class="mktoLabel mktoHasWidth" style="width: 150px;">
<div class="mktoAsterix">*</div>Job Title
</label>
<div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="Title" name="Title" placeholder="Job Title *" maxlength="255" aria-labelledby="LblTitle InstructTitle" type="text"
class="mktoField mktoTextField mktoHasWidth mktoRequired" aria-required="true" style="width: 150px;"><span id="InstructTitle" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
<div class="mktoOffset" style="width: 5px;"></div>
<div class="mktoFieldWrap mktoRequiredField">
<div class="mk-form__select"><label for="Country" id="LblCountry" class="mktoLabel mktoHasWidth" style="width: 150px;">
<div class="mktoAsterix">*</div>Country:
</label><select id="Country" name="Country" aria-labelledby="LblCountry InstructCountry" class="mktoField mktoHasWidth mktoRequired mk-form--initialized" aria-required="true" style="width: 150px;">
<option value="">Country *</option>
<option value="United States">United States</option>
<option value="Afghanistan">Afghanistan</option>
<option value="Albania">Albania</option>
<option value="Algeria">Algeria</option>
<option value="Andorra">Andorra</option>
<option value="Angola">Angola</option>
<option value="Antigua and Barbuda">Antigua and Barbuda</option>
<option value="Argentina">Argentina</option>
<option value="Armenia">Armenia</option>
<option value="Aruba">Aruba</option>
<option value="Australia">Australia</option>
<option value="Austria">Austria</option>
<option value="Azerbaijan">Azerbaijan</option>
<option value="Bahamas, The">Bahamas, The</option>
<option value="Bahrain">Bahrain</option>
<option value="Bangladesh">Bangladesh</option>
<option value="Barbados">Barbados</option>
<option value="Belarus">Belarus</option>
<option value="Belgium">Belgium</option>
<option value="Belize">Belize</option>
<option value="Benin">Benin</option>
<option value="Bhutan">Bhutan</option>
<option value="Bolivia">Bolivia</option>
<option value="Bosnia and Herzegovina">Bosnia and Herzegovina</option>
<option value="Botswana">Botswana</option>
<option value="Brazil">Brazil</option>
<option value="Brunei">Brunei </option>
<option value="Bulgaria">Bulgaria</option>
<option value="Burkina Faso">Burkina Faso</option>
<option value="Burma">Burma</option>
<option value="Burundi">Burundi</option>
<option value="Cambodia">Cambodia</option>
<option value="Cameroon">Cameroon</option>
<option value="Canada">Canada</option>
<option value="Cape Verde">Cape Verde</option>
<option value="Central African Republic">Central African Republic</option>
<option value="Chad">Chad</option>
<option value="Chile">Chile</option>
<option value="China">China</option>
<option value="Colombia">Colombia</option>
<option value="Comoros">Comoros</option>
<option value="Congo, Democratic Republic of the">Congo, Democratic Republic of the</option>
<option value="Congo, Republic of the">Congo, Republic of the</option>
<option value="Costa Rica">Costa Rica</option>
<option value="Cote d'Ivoire">Cote d'Ivoire</option>
<option value="Croatia">Croatia</option>
<option value="Cuba">Cuba</option>
<option value="Curacao">Curacao</option>
<option value="Cyprus">Cyprus</option>
<option value="Czech Republic">Czech Republic</option>
<option value="Denmark">Denmark</option>
<option value="Djibouti">Djibouti</option>
<option value="Dominica">Dominica</option>
<option value="Dominican Republic">Dominican Republic</option>
<option value="East Timor (see Timor-Leste)">East Timor (see Timor-Leste)</option>
<option value="Ecuador">Ecuador</option>
<option value="Egypt">Egypt</option>
<option value="El Salvador">El Salvador</option>
<option value="Equatorial Guinea">Equatorial Guinea</option>
<option value="Eritrea">Eritrea</option>
<option value="Estonia">Estonia</option>
<option value="Ethiopia">Ethiopia</option>
<option value="Fiji">Fiji</option>
<option value="Finland">Finland</option>
<option value="France">France</option>
<option value="Gabon">Gabon</option>
<option value="Gambia, The">Gambia, The</option>
<option value="Georgia">Georgia</option>
<option value="Germany">Germany</option>
<option value="Ghana">Ghana</option>
<option value="Greece">Greece</option>
<option value="Grenada">Grenada</option>
<option value="Guatemala">Guatemala</option>
<option value="Guinea">Guinea</option>
<option value="Guinea-Bissau">Guinea-Bissau</option>
<option value="Guyana">Guyana</option>
<option value="Haiti">Haiti</option>
<option value="Holy See">Holy See</option>
<option value="Honduras">Honduras</option>
<option value="Hong Kong">Hong Kong</option>
<option value="Hungary">Hungary</option>
<option value="Iceland">Iceland</option>
<option value="India">India</option>
<option value="Indonesia">Indonesia</option>
<option value="Iran">Iran</option>
<option value="Iraq">Iraq</option>
<option value="Ireland">Ireland</option>
<option value="Israel">Israel</option>
<option value="Italy">Italy</option>
<option value="Jamaica">Jamaica</option>
<option value="Japan">Japan</option>
<option value="Jordan">Jordan</option>
<option value="Kazakhstan">Kazakhstan</option>
<option value="Kenya">Kenya</option>
<option value="Kiribati">Kiribati</option>
<option value="Korea, North">Korea, North</option>
<option value="Korea, South">Korea, South</option>
<option value="Kosovo">Kosovo</option>
<option value="Kuwait">Kuwait</option>
<option value="Kyrgyzstan">Kyrgyzstan</option>
<option value="Laos">Laos</option>
<option value="Latvia">Latvia</option>
<option value="Lebanon">Lebanon</option>
<option value="Lesotho">Lesotho</option>
<option value="Liberia">Liberia</option>
<option value="Libya">Libya</option>
<option value="Liechtenstein">Liechtenstein</option>
<option value="Lithuania">Lithuania</option>
<option value="Luxembourg">Luxembourg</option>
<option value="Macau">Macau</option>
<option value="Macedonia">Macedonia</option>
<option value="Madagascar">Madagascar</option>
<option value="Malawi">Malawi</option>
<option value="Malaysia">Malaysia</option>
<option value="Maldives">Maldives</option>
<option value="Mali">Mali</option>
<option value="Malta">Malta</option>
<option value="Marshall Islands">Marshall Islands</option>
<option value="Mauritania">Mauritania</option>
<option value="Mauritius">Mauritius</option>
<option value="Mexico">Mexico</option>
<option value="Micronesia">Micronesia</option>
<option value="Moldova">Moldova</option>
<option value="Monaco">Monaco</option>
<option value="Mongolia">Mongolia</option>
<option value="Montenegro">Montenegro</option>
<option value="Morocco">Morocco</option>
<option value="Mozambique">Mozambique</option>
<option value="Namibia">Namibia</option>
<option value="Nauru">Nauru</option>
<option value="Nepal">Nepal</option>
<option value="Netherlands">Netherlands</option>
<option value="Netherlands Antilles">Netherlands Antilles</option>
<option value="New Zealand">New Zealand</option>
<option value="Nicaragua">Nicaragua</option>
<option value="Niger">Niger</option>
<option value="Nigeria">Nigeria</option>
<option value="North Korea">North Korea</option>
<option value="Norway">Norway</option>
<option value="Oman">Oman</option>
<option value="Pakistan">Pakistan</option>
<option value="Palau">Palau</option>
<option value="Palestinian Territories">Palestinian Territories</option>
<option value="Panama">Panama</option>
<option value="Papua New Guinea">Papua New Guinea</option>
<option value="Paraguay">Paraguay</option>
<option value="Peru">Peru</option>
<option value="Philippines">Philippines</option>
<option value="Poland">Poland</option>
<option value="Portugal">Portugal</option>
<option value="Qatar">Qatar</option>
<option value="Romania">Romania</option>
<option value="Russia">Russia</option>
<option value="Rwanda">Rwanda</option>
<option value="Saint Kitts and Nevis">Saint Kitts and Nevis</option>
<option value="Saint Lucia">Saint Lucia</option>
<option value="Saint Vincent and the Grenadines">Saint Vincent and the Grenadines</option>
<option value="Samoa">Samoa </option>
<option value="San Marino">San Marino</option>
<option value="Sao Tome and Principe">Sao Tome and Principe</option>
<option value="Saudi Arabia">Saudi Arabia</option>
<option value="Senegal">Senegal</option>
<option value="Serbia">Serbia</option>
<option value="Seychelles">Seychelles</option>
<option value="Sierra Leone">Sierra Leone</option>
<option value="Singapore">Singapore</option>
<option value="Sint Maarten">Sint Maarten</option>
<option value="Slovakia">Slovakia</option>
<option value="Slovenia">Slovenia</option>
<option value="Solomon Islands">Solomon Islands</option>
<option value="Somalia">Somalia</option>
<option value="South Africa">South Africa</option>
<option value="South Korea">South Korea</option>
<option value="South Sudan">South Sudan</option>
<option value="Spain">Spain </option>
<option value="Sri Lanka">Sri Lanka</option>
<option value="Sudan">Sudan</option>
<option value="Suriname">Suriname</option>
<option value="Swaziland">Swaziland </option>
<option value="Sweden">Sweden</option>
<option value="Switzerland">Switzerland</option>
<option value="Syria">Syria</option>
<option value="Taiwan">Taiwan</option>
<option value="Tajikistan">Tajikistan</option>
<option value="Tanzania">Tanzania</option>
<option value="Thailand">Thailand </option>
<option value="Timor-Leste">Timor-Leste</option>
<option value="Togo">Togo</option>
<option value="Tonga">Tonga</option>
<option value="Trinidad and Tobago">Trinidad and Tobago</option>
<option value="Tunisia">Tunisia</option>
<option value="Turkey">Turkey</option>
<option value="Turkmenistan">Turkmenistan</option>
<option value="Tuvalu">Tuvalu</option>
<option value="Uganda">Uganda</option>
<option value="Ukraine">Ukraine</option>
<option value="United Arab Emirates">United Arab Emirates</option>
<option value="United Kingdom">United Kingdom</option>
<option value="Uruguay">Uruguay</option>
<option value="Uzbekistan">Uzbekistan</option>
<option value="Vanuatu">Vanuatu</option>
<option value="Venezuela">Venezuela</option>
<option value="Vietnam">Vietnam</option>
<option value="Yemen">Yemen</option>
<option value="Zambia">Zambia</option>
<option value="Zimbabwe">Zimbabwe</option>
</select></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoPlaceholder mktoPlaceholderEmployees_Picklist__c"></div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
<div class="mktoOffset" style="width: 5px;"></div>
<div class="mktoFieldWrap mktoRequiredField">
<div class="mk-form__select"><label for="reusableFormEntry5" id="LblreusableFormEntry5" class="mktoLabel mktoHasWidth" style="width: 150px;">
<div class="mktoAsterix">*</div>Choose Timezone
</label><select id="reusableFormEntry5" name="reusableFormEntry5" aria-labelledby="LblreusableFormEntry5 InstructreusableFormEntry5" class="mktoField mktoHasWidth mktoRequired mk-form--initialized" aria-required="true"
style="width: 150px;">
<option value="">Choose Timezone... *</option>
<option value="Pacific Daylight Time (PDT)">Pacific Daylight Time (PDT)</option>
<option value="Central Daylight Time (CDT)">Central Daylight Time (CDT)</option>
<option value="Eastern Daylight Time (EDT)">Eastern Daylight Time (EDT)</option>
<option value="British Summer Time (BST)">British Summer Time (BST)</option>
<option value="Central European Summer Time (CEST)">Central European Summer Time (CEST)</option>
<option value="Australian Eastern Standard Time (AEST)">Australian Eastern Standard Time (AEST)</option>
<option value="Singapore Time (SGT)">Singapore Time (SGT)</option>
</select></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
<div class="mktoOffset" style="width: 5px;"></div>
<div class="mktoFieldWrap mktoRequiredField">
<div class="mk-form__select"><label for="eventAttendeeType" id="LbleventAttendeeType" class="mktoLabel mktoHasWidth" style="width: 150px;">
<div class="mktoAsterix">*</div>Attendee Type:
</label><select id="eventAttendeeType" name="eventAttendeeType" aria-labelledby="LbleventAttendeeType InstructeventAttendeeType" class="mktoField mktoHasWidth mktoRequired mk-form--initialized" aria-required="true" style="width: 150px;">
<option value="">Attendee Type *</option>
<option value="Customer">Customer</option>
<option value="Prospective Customer">Prospective Customer</option>
<option value="Partner">Partner</option>
<option value="Analyst">Analyst</option>
<option value="Student">Student</option>
<option value="Proofpoint Employee">Proofpoint Employee</option>
</select></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
<div class="mktoOffset" style="width: 5px;"></div>
<div class="mktoFieldWrap mktoRequiredField">
<div class="mk-form__select"><label for="eventTopicInterest" id="LbleventTopicInterest" class="mktoLabel mktoHasWidth" style="width: 150px;">
<div class="mktoAsterix">*</div>What Track Most Interests You?
</label><select id="eventTopicInterest" name="eventTopicInterest" aria-labelledby="LbleventTopicInterest InstructeventTopicInterest" class="mktoField mktoHasWidth mktoRequired mk-form--initialized" aria-required="true"
style="width: 150px;">
<option value="">What Track Most Interests You? *</option>
<option value="Information Protection">Information Protection/Cloud Security</option>
<option value="Threat Protection">Threat Protection</option>
<option value="Compliance">Compliance</option>
<option value="CISO/Thought Leadership">CISO/Thought Leadership</option>
</select></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoPlaceholder mktoPlaceholderprogramRouter"></div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Pay_Per_Click_Keyword__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 5px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Most_Recent_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="website" placeholder="" style="margin-bottom: 5px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Most_Recent_Asset_Type__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="Meeting" placeholder="" style="margin-bottom: 5px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Most_Recent_Medium_Detail__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="www-pfpt" placeholder="" style="margin-bottom: 5px;">
<div class="mktoClear"></div>
</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoNative" style="margin-left: 110px;"><button type="submit" class="mktoButton">Register</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
value="13526" placeholder=""><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="309-RHV-619" placeholder=""><input type="hidden" name="Website_Conversion_URL__c" class="mktoField mktoFieldDescriptor"
value="https://www.proofpoint.com/au/events/protect"><input type="hidden" name="gAClientID" class="mktoField mktoFieldDescriptor" value="1905736413.1648447891">
<div class="mktoFormRow">
<div class="mktoFormCol" style="margin-bottom: 5px;">
<div class="mktoOffset mktoHasWidth" style="width: 5px;"></div>
<div class="mktoFieldWrap">
<div class="mktoHtmlText mktoHasWidth" style="width: 255px;">
<script>
// <![CDATA[
MktoForms2.whenReady(function(form) {
var formEl = form.getFormElem()[0],
moveEl = formEl.querySelector('#addl_info');
[].forEach.call(formEl.querySelectorAll('.mktoForm > .mktoFormRow'), function(row) {
!row.contains(moveEl) || formEl.appendChild(row);
});
});
// ]]>
</script>
<div id="addl_info"><span style="font-size: 11px;"><span style="font-size: 11px;"><br></span></span>
<p>For more information, please see our <a href="https://www.proofpoint.com/us/privacy-policy" target="_blank" id="">Privacy Policy.</a> By registering, you agree to the following
<a href="https://proofpoint.com/us/events/protect/terms-of-participation" target="_blank">Terms of Participation.</a> If you prefer not to receive marketing emails from Proofpoint, you can opt-out of all marketing communications or
customise your preferences <a href="https://go.proofpoint.com/subscribe.html" target="_blank" id="">here</a>.<br></p>
</div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<fieldset id="db_data_container" style="border: none;"><input id="db_registry_company_name" name="db_registry_company_name" type="hidden" value=""><input id="db_registry_city" name="db_registry_city" type="hidden" value="Stockholm"><input
id="db_registry_state" name="db_registry_state" type="hidden" value="AB"><input id="db_registry_zip_code" name="db_registry_zip_code" type="hidden" value="109 42"><input id="db_registry_area_code" name="db_registry_area_code" type="hidden"
value=""><input id="db_registry_dma_code" name="db_registry_dma_code" type="hidden" value=""><input id="db_registry_country" name="db_registry_country" type="hidden" value="Sweden"><input id="db_registry_country_code"
name="db_registry_country_code" type="hidden" value="SE"><input id="db_registry_country_code3" name="db_registry_country_code3" type="hidden" value=""><input id="db_registry_latitude" name="db_registry_latitude" type="hidden"
value="59.33"><input id="db_registry_longitude" name="db_registry_longitude" type="hidden" value="18.07"><input id="demandbasesid" name="demandbasesid" type="hidden" value="125495989"><input id="db_marketing_alias" name="db_marketing_alias"
type="hidden" value="Lake Solutions"><input id="Industry" name="Industry" type="hidden" value="Software & Technology"><input id="db_sub_industry" name="db_sub_industry" type="hidden" value="Data & Technical Services"><input
id="db_employee_count" name="db_employee_count" type="hidden" value="4"><input id="db_isp" name="db_isp" type="hidden" value="false"><input id="db_primary_sic" name="db_primary_sic" type="hidden" value="7379"><input id="db_primary_naics"
name="db_primary_naics" type="hidden" value="541510"><input id="Address" name="Address" type="hidden" value="Neugutstrasse 16"><input id="City" name="City" type="hidden" value="Wallisellen"><input id="State" name="State" type="hidden"
value="ZH"><input id="Postalcode" name="Postalcode" type="hidden" value=""><input id="db_country_name" name="db_country_name" type="hidden" value="Switzerland"><input id="db_phone" name="db_phone" type="hidden" value="+41 44 877 38 77"><input
id="db_stock_ticker" name="db_stock_ticker" type="hidden" value=""><input id="Website" name="Website" type="hidden" value="lake.ch"><input id="db_annual_sales" name="db_annual_sales" type="hidden" value="860000"><input id="AnnualRevenue"
name="AnnualRevenue" type="hidden" value="$1 - $1M"><input id="Employees_Picklist__c" name="Employees_Picklist__c" type="hidden" value="Less than 250"><input id="db_b2b" name="db_b2b" type="hidden" value="true"><input id="db_b2c" name="db_b2c"
type="hidden" value="false"><input id="db_traffic" name="db_traffic" type="hidden" value="Low"><input id="db_latitude" name="db_latitude" type="hidden" value="47.41"><input id="db_longitude" name="db_longitude" type="hidden" value="8.6"><input
id="db_fortune_1000" name="db_fortune_1000" type="hidden" value="false"><input id="db_forbes_2000" name="db_forbes_2000" type="hidden" value="false"><input id="db_information_level" name="db_information_level" type="hidden"
value="Detailed"><input id="db_audience" name="db_audience" type="hidden" value="SMB"><input id="db_audience_segment" name="db_audience_segment" type="hidden" value="Software & Technology"><input id="db_ip" name="db_ip" type="hidden"
value="217.64.151.5"><input id="db_region_name" name="db_region_name" type="hidden" value="Stockholm"><input id="demandBase_Data_Source" name="demandBase_Data_Source" type="hidden" value="ip"></fieldset>
</form>
<form data-mkto-id="13526" data-mkto-base="//app-abj.marketo.com" data-munchkin-id="309-RHV-619" data-submit-text="" data-redirect-link="https://www.proofpoint.com/uk/events/protect/thank-you" data-prefill="" data-event-label=""
class="mk-form__form marketo-form-block__form mktoForm mktoHasWidth mktoLayoutLeft" novalidate="novalidate"
style="font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>
Text Content
Skip to main content Products Solutions Partners Resources Company ContactLanguages Support Log-in Digital Risk Portal Email Fraud Defense ET Intelligence Proofpoint Essentials Sendmail Support Log-in Main Menu EMAIL SECURITY AND PROTECTION Defend against threats, ensure business continuity, and implement email policies. ADVANCED THREAT PROTECTION Protect against email, mobile, social and desktop threats. SECURITY AWARENESS TRAINING Engage your users and turn them into a strong line of defense against phishing and other cyber attacks. CLOUD SECURITY Defend against cyber criminals accessing your sensitive data and trusted accounts. ARCHIVING AND COMPLIANCE Reduce risk, control costs and improve data visibility to ensure compliance. INFORMATION PROTECTION Safeguard data in email, cloud apps, on-premise file shares and SharePoint. DIGITAL RISK PROTECTION Protect against digital security risks across web domains, social media and the deep and dark web. PREMIUM SECURITY SERVICES Get deeper insight with on-call, personalised assistance from our expert team. RANSOMWARE SURVIVAL GUIDE Learn what to do before, during and after a ransomware attack with the 2022 Ransomware Survival Guide. Learn More SOLUTIONS BY TOPIC COMBAT EMAIL AND CLOUD THREATS Protect your people from email and cloud threats with an intelligent and holistic approach. CHANGE USER BEHAVIOUR Help your employees identify, resist and report attacks before the damage is done. COMBAT DATA LOSS AND INSIDER RISK Prevent data loss via negligent, compromised and malicious insiders by correlating content, behaviour and threats. MODERNISE COMPLIANCE AND ARCHIVING Manage risk and data retention needs with a modern compliance and archiving solution. PROTECT CLOUD APPS Keep your people and their cloud apps secure by eliminating threats, avoiding data loss and mitigating compliance risk. SECURE MICROSOFT 365 Implement the very best security and compliance solution for your Microsoft 365 collaboration suite. DEFEND YOUR REMOTE WORKFORCE Secure access to corporate resources and ensure business continuity for your remote workers. WHY PROOFPOINT Today’s cyber attacks target people. Learn about our unique people-centric approach to protection. SOLUTIONS BY INDUSTRY Federal Government Financial Services Healthcare Mobile for ISPs Email for ISPs Small and Medium Businesses PARTNER PROGRAMS CHANNEL PARTNERS Become a channel partner. Deliver Proofpoint solutions to your customers and grow your business. ARCHIVE EXTRACTION PARTNERS Learn about the benefits of becoming a Proofpoint Extraction Partner. TECHNOLOGY AND ALLIANCE PARTNERS Learn about our relationships with industry-leading firms to help protect your people, data and brand. SOCIAL MEDIA PROTECTION PARTNERS Learn about the technology and alliance partners in our Social Media Protection Partner program. PARTNER TOOLS Become a Channel Partner Channel Partner Portal RESOURCE LIBRARY Find the information you're looking for in our library of videos, data sheets, white papers and more. BLOG Keep up with the latest news and happenings in the ever-evolving cybersecurity landscape. PODCASTS Learn about the human side of cybersecurity. Episodes feature insights from experts and executives. THREAT GLOSSARY Learn about the latest security threats and how to protect your people, data, and brand. EVENTS Connect with us at events to learn how to protect your people and data from ever-evolving threats. CUSTOMER STORIES Read how Proofpoint customers around the globe solve their most pressing cybersecurity challenges. WEBINARS Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity. SECURITY HUBS Get free research and resources to help you protect against threats, build a security culture, and stop ransomware in its tracks. Cybersecurity Awareness Hub Ransomware Hub Compliance Hub ABOUT PROOFPOINT Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. WHY PROOFPOINT Today’s cyber attacks target people. Learn about our unique people-centric approach to protection. NEWS CENTER Read the latest press releases, news stories and media highlights about Proofpoint. SUPPORT Access the full range of Proofpoint support services. Learn More United States United Kingdom France Germany Italy Spain Japan Australia Products Overview Email Protection Email Fraud Defense Threat Response Auto-Pull Sendmail Open Source Essentials for Small Business Overview Targeted Attack Protection in Email Email Isolation Threat Response Emerging Threats Intelligence Overview Simulated Phishing and Knowledge Assessments Training Modules, Videos and Materials Phishing Email Reporting and Analysis Business Intelligence Overview Browser Isolation Cloud Account Defense Cloud App Security Broker Web Security Overview Capture & Monitor Content Capture Content Patrol Compliance Gateway Archiving Enterprise Archive Intelligent Supervision E-discovery Analytics NexusAI Compliance Overview Endpoint Data Loss Prevention (DLP) Enterprise Data Loss Prevention (DLP) Email Data Loss Prevention (DLP) Email Encryption Data Discover Insider Threat Management Overview Social Media Protection Digital Compliance Domain Fraud Monitoring Executive and Location Threat Monitoring Overview Technical Account Managers Premium Threat Information Service Managed Services for Security Awareness Training People-Centric Security Program Managed Services for Information Protection Products Solutions Partners Resources Company United States United Kingdom France Germany Italy Spain Japan Australia Login Support Log-in Digital Risk Portal Email Fraud Defense ET Intelligence Proofpoint Essentials Sendmail Support Log-in Contact EMAIL SECURITY AND PROTECTION Defend against threats, ensure business continuity, and implement email policies. ADVANCED THREAT PROTECTION Protect against email, mobile, social and desktop threats. SECURITY AWARENESS TRAINING Engage your users and turn them into a strong line of defense against phishing and other cyber attacks. CLOUD SECURITY Defend against cyber criminals accessing your sensitive data and trusted accounts. ARCHIVING AND COMPLIANCE Reduce risk, control costs and improve data visibility to ensure compliance. INFORMATION PROTECTION Safeguard data in email, cloud apps, on-premise file shares and SharePoint. DIGITAL RISK PROTECTION Protect against digital security risks across web domains, social media and the deep and dark web. PREMIUM SECURITY SERVICES Get deeper insight with on-call, personalised assistance from our expert team. Overview Email Protection Email Fraud Defense Threat Response Auto-Pull Sendmail Open Source Essentials for Small Business Overview Targeted Attack Protection in Email Email Isolation Threat Response Emerging Threats Intelligence Overview Simulated Phishing and Knowledge Assessments Training Modules, Videos and Materials Phishing Email Reporting and Analysis Business Intelligence Overview Browser Isolation Cloud Account Defense Cloud App Security Broker Web Security Overview Capture & Monitor Content Capture Content Patrol Compliance Gateway Archiving Enterprise Archive Intelligent Supervision E-discovery Analytics NexusAI Compliance Overview Endpoint Data Loss Prevention (DLP) Enterprise Data Loss Prevention (DLP) Email Data Loss Prevention (DLP) Email Encryption Data Discover Insider Threat Management Overview Social Media Protection Digital Compliance Domain Fraud Monitoring Executive and Location Threat Monitoring Overview Technical Account Managers Premium Threat Information Service Managed Services for Security Awareness Training People-Centric Security Program Managed Services for Information Protection RANSOMWARE SURVIVAL GUIDE Learn what to do before, during and after a ransomware attack with the 2022 Ransomware Survival Guide. Learn More SOLUTIONS BY TOPIC COMBAT EMAIL AND CLOUD THREATS Protect your people from email and cloud threats with an intelligent and holistic approach. CHANGE USER BEHAVIOUR Help your employees identify, resist and report attacks before the damage is done. COMBAT DATA LOSS AND INSIDER RISK Prevent data loss via negligent, compromised and malicious insiders by correlating content, behaviour and threats. MODERNISE COMPLIANCE AND ARCHIVING Manage risk and data retention needs with a modern compliance and archiving solution. PROTECT CLOUD APPS Keep your people and their cloud apps secure by eliminating threats, avoiding data loss and mitigating compliance risk. SECURE MICROSOFT 365 Implement the very best security and compliance solution for your Microsoft 365 collaboration suite. DEFEND YOUR REMOTE WORKFORCE Secure access to corporate resources and ensure business continuity for your remote workers. WHY PROOFPOINT Today’s cyber attacks target people. Learn about our unique people-centric approach to protection. SOLUTIONS BY INDUSTRY Federal Government Financial Services Healthcare Mobile for ISPs Email for ISPs Small and Medium Businesses PARTNER PROGRAMS CHANNEL PARTNERS Become a channel partner. Deliver Proofpoint solutions to your customers and grow your business. ARCHIVE EXTRACTION PARTNERS Learn about the benefits of becoming a Proofpoint Extraction Partner. TECHNOLOGY AND ALLIANCE PARTNERS Learn about our relationships with industry-leading firms to help protect your people, data and brand. SOCIAL MEDIA PROTECTION PARTNERS Learn about the technology and alliance partners in our Social Media Protection Partner program. PARTNER TOOLS Become a Channel Partner Channel Partner Portal RESOURCE LIBRARY Find the information you're looking for in our library of videos, data sheets, white papers and more. BLOG Keep up with the latest news and happenings in the ever-evolving cybersecurity landscape. PODCASTS Learn about the human side of cybersecurity. Episodes feature insights from experts and executives. THREAT GLOSSARY Learn about the latest security threats and how to protect your people, data, and brand. EVENTS Connect with us at events to learn how to protect your people and data from ever-evolving threats. CUSTOMER STORIES Read how Proofpoint customers around the globe solve their most pressing cybersecurity challenges. WEBINARS Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity. SECURITY HUBS Get free research and resources to help you protect against threats, build a security culture, and stop ransomware in its tracks. Cybersecurity Awareness Hub Ransomware Hub Compliance Hub ABOUT PROOFPOINT Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. WHY PROOFPOINT Today’s cyber attacks target people. Learn about our unique people-centric approach to protection. NEWS CENTER Read the latest press releases, news stories and media highlights about Proofpoint. SUPPORT Access the full range of Proofpoint support services. Learn More Zeigen Sie weiterhin Inhalte für Ihren Standort an United StatesUnited KingdomFranceDeutschlandEspaña日本AustraliaItaliaFortsetzen Events Protect WISDOM May 19, 2022 Security Awareness Learn More AGENDA View full Protect agenda. Learn More FREQUENTLY ASKED QUESTIONS Get all the answers here. Learn More PROTECT 2022 Welcome to Proofpoint Protect 2022. In a new world of advanced security threats and compliance risks, one thing remains the same. Attackers target people. And their techniques have evolved to become broader and more integrated over time. This makes it increasingly important to protect your people and your data. Join us at Protect 2022 to learn how you can tap into the power of Proofpoint to counter modern attacks and protect against compliance violations. WHY ATTEND PROOFPOINT PROTECT 2022? * Hear compelling keynotes from Proofpoint executives and industry experts * Discover how top cybersecurity and compliance professionals are protecting their organizations and people with Proofpoint products * Learn about new Proofpoint products that will accelerate your journey to people-centric security and compliance * Learn how to access and apply data insights to fortify your cybersecurity and compliance posture * Discuss with fellow top CISOs trends and best practices, such as engaging with the board of directors and cyber insurance View Full Agenda * First Name * Last Name * Business Email * Company Name * Job Title * Country:Country *United StatesAfghanistanAlbaniaAlgeriaAndorraAngolaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamas, TheBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBhutanBoliviaBosnia and HerzegovinaBotswanaBrazilBrunei BulgariaBurkina FasoBurmaBurundiCambodiaCameroonCanadaCape VerdeCentral African RepublicChadChileChinaColombiaComorosCongo, Democratic Republic of theCongo, Republic of theCosta RicaCote d'IvoireCroatiaCubaCuracaoCyprusCzech RepublicDenmarkDjiboutiDominicaDominican RepublicEast Timor (see Timor-Leste)EcuadorEgyptEl SalvadorEquatorial GuineaEritreaEstoniaEthiopiaFijiFinlandFranceGabonGambia, TheGeorgiaGermanyGhanaGreeceGrenadaGuatemalaGuineaGuinea-BissauGuyanaHaitiHoly SeeHondurasHong KongHungaryIcelandIndiaIndonesiaIranIraqIrelandIsraelItalyJamaicaJapanJordanKazakhstanKenyaKiribatiKorea, NorthKorea, SouthKosovoKuwaitKyrgyzstanLaosLatviaLebanonLesothoLiberiaLibyaLiechtensteinLithuaniaLuxembourgMacauMacedoniaMadagascarMalawiMalaysiaMaldivesMaliMaltaMarshall IslandsMauritaniaMauritiusMexicoMicronesiaMoldovaMonacoMongoliaMontenegroMoroccoMozambiqueNamibiaNauruNepalNetherlandsNetherlands AntillesNew ZealandNicaraguaNigerNigeriaNorth KoreaNorwayOmanPakistanPalauPalestinian TerritoriesPanamaPapua New GuineaParaguayPeruPhilippinesPolandPortugalQatarRomaniaRussiaRwandaSaint Kitts and NevisSaint LuciaSaint Vincent and the GrenadinesSamoa San MarinoSao Tome and PrincipeSaudi ArabiaSenegalSerbiaSeychellesSierra LeoneSingaporeSint MaartenSlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSouth KoreaSouth SudanSpain Sri LankaSudanSurinameSwaziland SwedenSwitzerlandSyriaTaiwanTajikistanTanzaniaThailand Timor-LesteTogoTongaTrinidad and TobagoTunisiaTurkeyTurkmenistanTuvaluUgandaUkraineUnited Arab EmiratesUnited KingdomUruguayUzbekistanVanuatuVenezuelaVietnamYemenZambiaZimbabwe * Choose TimezoneChoose Timezone... *Pacific Daylight Time (PDT)Central Daylight Time (CDT)Eastern Daylight Time (EDT)British Summer Time (BST)Central European Summer Time (CEST)Australian Eastern Standard Time (AEST)Singapore Time (SGT) * Attendee Type:Attendee Type *CustomerProspective CustomerPartnerAnalystStudentProofpoint Employee * What Track Most Interests You?What Track Most Interests You? *Information Protection/Cloud SecurityThreat ProtectionComplianceCISO/Thought Leadership Register For more information, please see our Privacy Policy. By registering, you agree to the following Terms of Participation. If you prefer not to receive marketing emails from Proofpoint, you can opt-out of all marketing communications or customise your preferences here. Thank you for your submission. FEATURED SPEAKERS ASHAN WILLY Chief Executive Officer, Proofpoint RYAN KALEMBER EVP, Cybersecurity Strategy, Proofpoint TRACKS INNOVATIONS AND PLATFORMS TO PROTECT YOU. PLAN YOUR EXPERIENCE AT PROTECT 2022. Information and Cloud Security Threat Protection Compliance CISO / Thought Leadership INFORMATION AND CLOUD SECURITY Remote work and adoption of cloud applications are driving concerns around data loss and cloud security. Join us for a mix of roadmap, customer panels, and demonstrations of new innovations for our solutions to protect your information in a work-from-anywhere world. * Get a roadmap of Proofpoint People-centric Enterprise Data Loss Prevention and Security Services Edge * Hear from panels featuring customers and experts discussing strategies and best practices * See how to tackle key use cases with fast time to value THREAT PROTECTION The Threat Protection track brings together Proofpoint customers and product leaders to explore the evolving threat landscape and best practices to defend against threats such as ransomware, business email compromise, cloud account compromise, and malware. Featuring a mix of customer sessions and product overviews, you get real-world insights and advice on protecting the No.1 threat vector. * Preview Proofpoint Threat Protection product strategy and roadmap * Hear from customers about their email and cloud security strategies * Explore how integrating controls can supercharge your security * Join practitioner sessions covering practical implementation of email security controls COMPLIANCE We now live in a world where most interactions will remain virtual, and employees continue to work remotely. Are you prepared for the volume and diversity in the types of digital communications that require your attention—from both a regulatory and legal perspective? The Proofpoint Compliance Platform is here to help. * Learn how our Intelligent Compliance roadmap is helping you stay aligned with what is needed to stay compliant and with legal protection * Hear from industry experts and Proofpoint customers on trends in the compliance landscape * Join hands-on sessions that show the power of the Proofpoint Compliance Platform CISO / THOUGHT LEADERSHIP Join other information security leaders in thought-provoking topics that CISOs face in today’s complex world. You’ll gain a wealth of best practices and leadership advice on better ways to mitigate risk and protect your most valuable asset—your people. * Learn about best practices for interacting with the company board of directors * Hear from fellow CISOs on trends in the regulatory landscape and cyber insurance * See how to use a people-centric framework to understand risk and reduce it within your organization * Learn about our findings from our annual Voice of the CISO report AGENDA -------------------------------------------------------------------------------- Singapore Time (SGT)Pacific Daylight Time (PDT)Central Daylight Time (CDT)Eastern Daylight Time (EDT)British Summer Time (BST)Central European Summer Time (CEST) Choose your time zone: The conference is offered multiple times to accommodate different time zones. Australian Eastern Standard Time (AEST) Singapore Time (SGT) Pacific Daylight Time (PDT) Central Daylight Time (CDT) Eastern Daylight Time (EDT) British Summer Time (BST) Central European Summer Time (CEST) May 18 | Wed May 19 | Thu DAY 1 10:00AM - 10:10AM Protect Opening Message 10:10AM - 10:25AM Proofpoint Welcome Keynote with Ashan Willy, CEO -------------------------------------------------------------------------------- Ashan will provide a company update and share exciting announcements on our people-centric innovations to help you mitigate security and compliance risks. 10:25AM - 10:50AM Customer Panel - Protecting Against the Threat and Risk Actor's Platform -------------------------------------------------------------------------------- Phishing, ransomware, BEC, account compromised suppliers… the list of tools accessible to threat actors continues to both expand and integrate into the modern attacker's platform. Join us in this panel of CISOs to discuss how they counter the threat actor’s attack platform targeting their most valuable asset - their people. 10:50AM - 11:00AM Break and Updates 11:00AM - 11:25AM Customer Panel - Reducing Risk in Information Loss and Cloud Threats -------------------------------------------------------------------------------- With all that's changed in technology, data still doesn't lose itself - malicious, compromised, or careless users lose it. A new people-centric approach is needed to counter data loss - especially with employees working remote and adopting cloud applications. Join this panel of CISOs as they discuss how they counter data loss and reduce insider risk. 11:25AM - 11:55AM The Proofpoint Platforms vs. The Attacker's Platform -------------------------------------------------------------------------------- With risk continuing to converge around people, Proofpoint is helping you keep pace with the visibility, effectiveness, and operational efficiency you need to mitigate those risks. Join this session to hear about Proofpoint’s latest innovations across our threat protection, information protection, and compliance platforms. 11:55AM - 12:00PM Break and Updates 12:00PM - 12:20PM Guest Speaker -------------------------------------------------------------------------------- Our Protect guest speaker will be announced shortly 12:20PM - 12:30PM Closing Session DAY 2 3:00AM - 6:00AM AEST Content Tracks Information Protection and Cloud Security Threat Protection Compliance CISO / Thought Leadership 3:00AM - 3:05AM AEST Welcome to Protect - Day 2 3:05AM - 3:35AM AEST Roadmap + Vision: Defending Against Email Threats Targeting Your People 3:35AM - 3:40AM AEST Break 3:40AM - 4:10AM AEST Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss 4:10AM - 4:15AM AEST Break 4:15AM - 4:45AM AEST Solving Real Security Problems - Proofpoint Security Services Edge -------------------------------------------------------------------------------- Proofpoint has integrated technologies such as CASB, SWG, RBI to address the needs of cloud security into what we call Proofpoint Security Services Edge. But let's put aside the technology acronym and join this panel of cloud security experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is uniquely able to solve them. 4:45AM - 4:50AM AEST Break 4:50AM - 5:20AM AEST Reducing Data Loss Risk with Everyone Working Remote and Adopting Cloud Apps -------------------------------------------------------------------------------- Join us in this panel where users of the Proofpoint platform will share how they adopted a people-centric approach to data loss and insider threat and were able to reduce the risk associated with their data. 5:20AM - 5:25AM AEST Break 5:25AM - 5:55AM AEST Practitioner's session: Using the Proofpoint Platform to Reduce Data Loss -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to put into production Proofpoint's Data Loss Prevention platform. 5:55AM - 6:00AM AEST Closing Session 3:00AM - 3:05AM AEST Welcome to Protect - Day 2 3:05AM - 3:35AM AEST Roadmap + Vision: Defending Against Email Threats Targeting Your People 3:35AM - 3:40AM AEST Break 3:40AM - 4:10AM AEST Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss 4:10AM - 4:15AM AEST Break 4:15AM - 4:45AM AEST Countering the Attacker's Platform with the Proofpoint Platform -------------------------------------------------------------------------------- Join us in this panel where Proofpoint users will share their journey adopting and growing their Proofpoint Threat Protection platform - from protecting against email threats, making their end users resilient, fighting against cloud delivered threats. 4:45AM - 4:50AM AEST Break 4:50AM - 5:20AM AEST Expanding Defenses with Email Authentication -------------------------------------------------------------------------------- Join this customer session to learn why and how they implemented email authentication to address the concerns of email impersonation, BEC attacks, supplier risk and application email hygiene aimed at employees, customers and partners. 5:20AM - 5:25AM AEST Break 5:25AM - 5:55AM AEST Practitioner's session: Using the Proofpoint platform to defend against threats -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to counter the attacker's platform and protect your users over email and the cloud. 5:55AM - 6:00AM AEST Closing Session 3:00AM - 3:05AM AEST Welcome to Protect - Day 2 3:05AM - 3:35AM AEST Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap -------------------------------------------------------------------------------- When the next decade of workplace communications relies solely on digital collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for Financial Services and regulated organizations to understand how Proofpoint is staying ahead with you for maximum Compliance and Legal protection 3:35AM - 3:40AM AEST Break 3:40AM - 4:10AM AEST Compliance & Legal Trends in 2022 -------------------------------------------------------------------------------- In the current ever-changing business landscape, join us to learn from industry experts and Proofpoint specialists as they discuss views on Compliance and Legal trends in 2022 and beyond. 4:10AM - 4:15AM AEST Break 4:15AM - 4:45AM AEST Regulatory Guidance on Compliance -------------------------------------------------------------------------------- Join us for a session with a regulatory industry expert to discuss best practices on how regulated organizations monitor and supervise business communications while protecting critical corporate data from insider threats. 4:45AM - 4:50AM AEST Break 4:50AM - 5:20AM AEST Technologies Impacting Litigation Readiness -------------------------------------------------------------------------------- Join us for a session with an experienced legal expert to discuss trends and best practices on building a sound corporate legal protection strategy for organizations with high exposure to litigations. 5:20AM - 5:25AM AEST Break 5:25AM - 5:55AM AEST Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to maximize the impact of your Proofpoint Compliance Platform. 5:55AM - 6:00AM AEST Closing Session 3:00AM - 3:05AM AEST Welcome to Protect - Day 2 3:05AM - 3:35AM AEST Voice of the CISO report -------------------------------------------------------------------------------- Learn what key challenges are facing CISOs across the globe as we unveil the findings of the 2022 Voice of the CISO report. The survey explores three key areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels of employee and organizational preparedness to face them, and the impact of supporting a hybrid workforce as businesses prepare to re-open their corporate offices. It also covers the challenges CISOs face in their roles, position amongst the C-suite, and business expectations of their teams. 3:35AM - 3:40AM AEST Break 3:40AM - 4:10AM AEST What’s Next in People-Centric Security: Roadmap and Overview for Nexus People Risk Explorer (NPRE) -------------------------------------------------------------------------------- Understanding your people-centric risk allows one to better plan and reduce your organization's risk posture. Join us in this session as we discuss with customers how they leverage the Proofpoint Nexus People Risk Explorer to understand risk and activate processes to reduce risk exposure. 4:10AM - 4:15AM AEST Break 4:15AM - 4:45AM AEST Strategies for Board Engagement -------------------------------------------------------------------------------- Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to elevate the profile of the CISO. The CISO now has a leadership voice and must use it to instill confidence at the highest levels of the organization and as the foremost executive on the front lines against the threat of systemic risk. A single cyber event can have devastating consequences on an organization's ability to deliver its operational value. CISOs need to have identified the potential ‘showstopper’ risks for their enterprise and ensure that the Board understands the position. Learn from veteran Board members about their journey to the Board room and expectations for understanding cyber risk. 4:45AM - 4:50AM AEST Break 4:50AM - 5:20AM AEST Regulatory landscape in 2022 -------------------------------------------------------------------------------- Managing data privacy risk in a dynamic regulatory environment is challenging. Compounding that is the fact that you have to defend your regulated data against threats inside and outside the organization. You need to put in “appropriate” or “reasonable” security measures, but it is up to you to develop them. Join us for a critical fireside chat with Global regulators. 5:20AM - 5:25AM AEST Break 5:25AM - 5:55AM AEST CISO perspective on cyber insurance -------------------------------------------------------------------------------- Cyber insurance is designed to transfer risks to the insurer. For insurers to be profitable, they must have a fundamental grasp of the risks facing organizations and shifts in the threat landscape. As work becomes increasingly flexible and more solutions move to the cloud, protecting organizations is increasingly challenging. Despite the challenges, Cyber Insurance exists for organizations to help address residual risk. Many organizations are faced with exponential premium increases as they try to understand what cyber insurance actually covers, while others are forced to renew due to contractual obligations or decide to self-insure. This environment creates confusion as organizations ask: does cyber insurance provides risk mitigation or just a measured level of resilience? 5:55AM - 6:00AM AEST Closing Session May 18 | Wed May 19 | Thu DAY 1 SESSION 3:00AM - 3:10AM AEST Protect Opening Message 3:10AM - 3:25AM AEST Proofpoint Welcome Keynote with Ashan Willy, CEO -------------------------------------------------------------------------------- Ashan will provide a company update and share exciting announcements on our people-centric innovations to help you mitigate security and compliance risks. 3:25AM - 3:50AM AEST Customer Panel - Protecting Against the Threat and Risk Actor's Platform -------------------------------------------------------------------------------- Phishing, ransomware, BEC, account compromised suppliers… the list of tools accessible to threat actors continues to both expand and integrate into the modern attacker's platform. Join us in this panel of CISOs to discuss how they counter the threat actor’s attack platform targeting their most valuable asset - their people. 3:50AM - 4:00AM AEST Break and Updates 4:00AM - 4:25AM AEST Customer Panel - Reducing Risk in Information Loss and Cloud Threats -------------------------------------------------------------------------------- With all that's changed in technology, data still doesn't lose itself - malicious, compromised, or careless users lose it. A new people-centric approach is needed to counter data loss - especially with employees working remote and adopting cloud applications. Join this panel of CISOs as they discuss how they counter data loss and reduce insider risk. 4:25AM - 4:55AM AEST The Proofpoint Platforms vs. The Attacker's Platform -------------------------------------------------------------------------------- With risk continuing to converge around people, Proofpoint is helping you keep pace with the visibility, effectiveness, and operational efficiency you need to mitigate those risks. Join this session to hear about Proofpoint’s latest innovations across our threat protection, information protection, and compliance platforms. 4:55AM - 5:00AM AEST Break and Updates 5:00AM - 5:20AM AEST Guest Speaker -------------------------------------------------------------------------------- Our Protect guest speaker will be announced shortly 5:20AM - 5:30AM AEST Closing Session DAY 2 SESSION 3:00AM - 6:00AM AEST Content Tracks Information Protection and Cloud Security Threat Protection Compliance CISO / Thought Leadership 3:00AM - 3:05AM AEST Welcome to Protect - Day 2 3:05AM - 3:35AM AEST Roadmap + Vision: Defending Against Email Threats Targeting Your People 3:35AM - 3:40AM AEST Break 3:40AM - 4:10AM AEST Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss 4:10AM - 4:15AM AEST Break 4:15AM - 4:45AM AEST Solving Real Security Problems - Proofpoint Security Services Edge -------------------------------------------------------------------------------- Proofpoint has integrated technologies such as CASB, SWG, RBI to address the needs of cloud security into what we call Proofpoint Security Services Edge. But let's put aside the technology acronym and join this panel of cloud security experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is uniquely able to solve them. 4:45AM - 4:50AM AEST Break 4:50AM - 5:20AM AEST Reducing Data Loss Risk with Everyone Working Remote and Adopting Cloud Apps -------------------------------------------------------------------------------- Join us in this panel where users of the Proofpoint platform will share how they adopted a people-centric approach to data loss and insider threat and were able to reduce the risk associated with their data. 5:20AM - 5:25AM AEST Break 5:25AM - 5:55AM AEST Practitioner's session: Using the Proofpoint Platform to Reduce Data Loss -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to put into production Proofpoint's Data Loss Prevention platform. 5:55AM - 6:00AM AEST Closing Session 3:00AM - 3:05AM AEST Welcome to Protect - Day 2 3:05AM - 3:35AM AEST Roadmap + Vision: Defending Against Email Threats Targeting Your People 3:35AM - 3:40AM AEST Break 3:40AM - 4:10AM AEST Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss 4:10AM - 4:15AM AEST Break 4:15AM - 4:45AM AEST Countering the Attacker's Platform with the Proofpoint Platform -------------------------------------------------------------------------------- Join us in this panel where Proofpoint users will share their journey adopting and growing their Proofpoint Threat Protection platform - from protecting against email threats, making their end users resilient, fighting against cloud delivered threats. 4:45AM - 4:50AM AEST Break 4:50AM - 5:20AM AEST Expanding Defenses with Email Authentication -------------------------------------------------------------------------------- Join this customer session to learn why and how they implemented email authentication to address the concerns of email impersonation, BEC attacks, supplier risk and application email hygiene aimed at employees, customers and partners. 5:20AM - 5:25AM AEST Break 5:25AM - 5:55AM AEST Practitioner's session: Using the Proofpoint platform to defend against threats -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to counter the attacker's platform and protect your users over email and the cloud. 5:55AM - 6:00AM AEST Closing Session 3:00AM - 3:05AM AEST Welcome to Protect - Day 2 3:05AM - 3:35AM AEST Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap -------------------------------------------------------------------------------- When the next decade of workplace communications relies solely on digital collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for Financial Services and regulated organizations to understand how Proofpoint is staying ahead with you for maximum Compliance and Legal protection 3:35AM - 3:40AM AEST Break 3:40AM - 4:10AM AEST Compliance & Legal Trends in 2022 -------------------------------------------------------------------------------- In the current ever-changing business landscape, join us to learn from industry experts and Proofpoint specialists as they discuss views on Compliance and Legal trends in 2022 and beyond. 4:10AM - 4:15AM AEST Break 4:15AM - 4:45AM AEST Regulatory Guidance on Compliance -------------------------------------------------------------------------------- Join us for a session with a regulatory industry expert to discuss best practices on how regulated organizations monitor and supervise business communications while protecting critical corporate data from insider threats. 4:45AM - 4:50AM AEST Break 4:50AM - 5:20AM AEST Technologies Impacting Litigation Readiness -------------------------------------------------------------------------------- Join us for a session with an experienced legal expert to discuss trends and best practices on building a sound corporate legal protection strategy for organizations with high exposure to litigations. 5:20AM - 5:25AM AEST Break 5:25AM - 5:55AM AEST Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to maximize the impact of your Proofpoint Compliance Platform. 5:55AM - 6:00AM AEST Closing Session 3:00AM - 3:05AM AEST Welcome to Protect - Day 2 3:05AM - 3:35AM AEST Voice of the CISO report -------------------------------------------------------------------------------- Learn what key challenges are facing CISOs across the globe as we unveil the findings of the 2022 Voice of the CISO report. The survey explores three key areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels of employee and organizational preparedness to face them, and the impact of supporting a hybrid workforce as businesses prepare to re-open their corporate offices. It also covers the challenges CISOs face in their roles, position amongst the C-suite, and business expectations of their teams. 3:35AM - 3:40AM AEST Break 3:40AM - 4:10AM AEST What’s Next in People-Centric Security: Roadmap and Overview for Nexus People Risk Explorer (NPRE) -------------------------------------------------------------------------------- Understanding your people-centric risk allows one to better plan and reduce your organization's risk posture. Join us in this session as we discuss with customers how they leverage the Proofpoint Nexus People Risk Explorer to understand risk and activate processes to reduce risk exposure. 4:10AM - 4:15AM AEST Break 4:15AM - 4:45AM AEST Strategies for Board Engagement -------------------------------------------------------------------------------- Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to elevate the profile of the CISO. The CISO now has a leadership voice and must use it to instill confidence at the highest levels of the organization and as the foremost executive on the front lines against the threat of systemic risk. A single cyber event can have devastating consequences on an organization's ability to deliver its operational value. CISOs need to have identified the potential ‘showstopper’ risks for their enterprise and ensure that the Board understands the position. Learn from veteran Board members about their journey to the Board room and expectations for understanding cyber risk. 4:45AM - 4:50AM AEST Break 4:50AM - 5:20AM AEST Regulatory landscape in 2022 -------------------------------------------------------------------------------- Managing data privacy risk in a dynamic regulatory environment is challenging. Compounding that is the fact that you have to defend your regulated data against threats inside and outside the organization. You need to put in “appropriate” or “reasonable” security measures, but it is up to you to develop them. Join us for a critical fireside chat with Global regulators. 5:20AM - 5:25AM AEST Break 5:25AM - 5:55AM AEST CISO perspective on cyber insurance -------------------------------------------------------------------------------- Cyber insurance is designed to transfer risks to the insurer. For insurers to be profitable, they must have a fundamental grasp of the risks facing organizations and shifts in the threat landscape. As work becomes increasingly flexible and more solutions move to the cloud, protecting organizations is increasingly challenging. Despite the challenges, Cyber Insurance exists for organizations to help address residual risk. Many organizations are faced with exponential premium increases as they try to understand what cyber insurance actually covers, while others are forced to renew due to contractual obligations or decide to self-insure. This environment creates confusion as organizations ask: does cyber insurance provides risk mitigation or just a measured level of resilience? 5:55AM - 6:00AM AEST Closing Session May 17 | Tue May 18 | Wed DAY 1 1:00AM - 1:10AM Protect Opening Message 1:10AM - 1:25AM Proofpoint Welcome Keynote with Ashan Willy, CEO -------------------------------------------------------------------------------- Ashan will provide a company update and share exciting announcements on our people-centric innovations to help you mitigate security and compliance risks. 1:25AM - 1:50AM Customer Panel - Protecting Against the Threat and Risk Actor's Platform -------------------------------------------------------------------------------- Phishing, ransomware, BEC, account compromised suppliers… the list of tools accessible to threat actors continues to both expand and integrate into the modern attacker's platform. Join us in this panel of CISOs to discuss how they counter the threat actor’s attack platform targeting their most valuable asset - their people. 1:50AM - 2:00AM Break and Updates 2:00AM - 2:25AM Customer Panel - Reducing Risk in Information Loss and Cloud Threats -------------------------------------------------------------------------------- With all that's changed in technology, data still doesn't lose itself - malicious, compromised, or careless users lose it. A new people-centric approach is needed to counter data loss - especially with employees working remote and adopting cloud applications. Join this panel of CISOs as they discuss how they counter data loss and reduce insider risk. 2:25AM - 2:55AM The Proofpoint Platforms vs. The Attacker's Platform -------------------------------------------------------------------------------- With risk continuing to converge around people, Proofpoint is helping you keep pace with the visibility, effectiveness, and operational efficiency you need to mitigate those risks. Join this session to hear about Proofpoint’s latest innovations across our threat protection, information protection, and compliance platforms. 2:55AM - 3:00AM Break and Updates 3:00AM - 3:20AM Guest Speaker -------------------------------------------------------------------------------- Our Protect guest speaker will be announced shortly 3:20AM - 3:30AM Closing Session DAY 2 6:00PM - 9:00PM AEST Content Tracks Information Protection and Cloud Security Threat Protection Compliance CISO / Thought Leadership 6:00PM - 6:05PM AEST Welcome to Protect - Day 2 6:05PM - 6:35PM AEST Roadmap + Vision: Defending Against Email Threats Targeting Your People 6:35PM - 6:40PM AEST Break 6:40PM - 7:10PM AEST Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss 7:10PM - 7:15PM AEST Break 7:15PM - 7:45PM AEST Solving Real Security Problems - Proofpoint Security Services Edge -------------------------------------------------------------------------------- Proofpoint has integrated technologies such as CASB, SWG, RBI to address the needs of cloud security into what we call Proofpoint Security Services Edge. But let's put aside the technology acronym and join this panel of cloud security experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is uniquely able to solve them. 7:45PM - 7:50PM AEST Break 7:50PM - 8:20PM AEST Reducing Data Loss Risk with Everyone Working Remote and Adopting Cloud Apps -------------------------------------------------------------------------------- Join us in this panel where users of the Proofpoint platform will share how they adopted a people-centric approach to data loss and insider threat and were able to reduce the risk associated with their data. 8:20PM - 8:25PM AEST Break 8:25PM - 8:55PM AEST Practitioner's session: Using the Proofpoint Platform to Reduce Data Loss -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to put into production Proofpoint's Data Loss Prevention platform. 8:55PM - 9:00PM AEST Closing Session 6:00PM - 6:05PM AEST Welcome to Protect - Day 2 6:05PM - 6:35PM AEST Roadmap + Vision: Defending Against Email Threats Targeting Your People 6:35PM - 6:40PM AEST Break 6:40PM - 7:10PM AEST Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss 7:10PM - 7:15PM AEST Break 7:15PM - 7:45PM AEST Countering the Attacker's Platform with the Proofpoint Platform -------------------------------------------------------------------------------- Join us in this panel where Proofpoint users will share their journey adopting and growing their Proofpoint Threat Protection platform - from protecting against email threats, making their end users resilient, fighting against cloud delivered threats. 7:45PM - 7:50PM AEST Break 7:50PM - 8:20PM AEST Expanding Defenses with Email Authentication -------------------------------------------------------------------------------- Join this customer session to learn why and how they implemented email authentication to address the concerns of email impersonation, BEC attacks, supplier risk and application email hygiene aimed at employees, customers and partners. 8:20PM - 8:25PM AEST Break 8:25PM - 8:55PM AEST Practitioner's session: Using the Proofpoint platform to defend against threats -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to counter the attacker's platform and protect your users over email and the cloud. 8:55PM - 9:00PM AEST Closing Session 6:00PM - 6:05PM AEST Welcome to Protect - Day 2 6:05PM - 6:35PM AEST Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap -------------------------------------------------------------------------------- When the next decade of workplace communications relies solely on digital collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for Financial Services and regulated organizations to understand how Proofpoint is staying ahead with you for maximum Compliance and Legal protection 6:35PM - 6:40PM AEST Break 6:40PM - 7:10PM AEST Compliance & Legal Trends in 2022 -------------------------------------------------------------------------------- In the current ever-changing business landscape, join us to learn from industry experts and Proofpoint specialists as they discuss views on Compliance and Legal trends in 2022 and beyond. 7:10PM - 7:15PM AEST Break 7:15PM - 7:45PM AEST Regulatory Guidance on Compliance -------------------------------------------------------------------------------- Join us for a session with a regulatory industry expert to discuss best practices on how regulated organizations monitor and supervise business communications while protecting critical corporate data from insider threats. 7:45PM - 7:50PM AEST Break 7:50PM - 8:20PM AEST Technologies Impacting Litigation Readiness -------------------------------------------------------------------------------- Join us for a session with an experienced legal expert to discuss trends and best practices on building a sound corporate legal protection strategy for organizations with high exposure to litigations. 8:20PM - 8:25PM AEST Break 8:25PM - 8:55PM AEST Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to maximize the impact of your Proofpoint Compliance Platform. 8:55PM - 9:00PM AEST Closing Session 6:00PM - 6:05PM AEST Welcome to Protect - Day 2 6:05PM - 6:35PM AEST Voice of the CISO report -------------------------------------------------------------------------------- Learn what key challenges are facing CISOs across the globe as we unveil the findings of the 2022 Voice of the CISO report. The survey explores three key areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels of employee and organizational preparedness to face them, and the impact of supporting a hybrid workforce as businesses prepare to re-open their corporate offices. It also covers the challenges CISOs face in their roles, position amongst the C-suite, and business expectations of their teams. 6:05PM - 6:35PM AEST Break 6:40PM - 7:10PM AEST What’s Next in People-Centric Security: Roadmap and Overview for Nexus People Risk Explorer (NPRE) -------------------------------------------------------------------------------- Understanding your people-centric risk allows one to better plan and reduce your organization's risk posture. Join us in this session as we discuss with customers how they leverage the Proofpoint Nexus People Risk Explorer to understand risk and activate processes to reduce risk exposure. 7:10PM - 7:15PM AEST Break 7:15PM - 7:45PM AEST Strategies for Board Engagement -------------------------------------------------------------------------------- Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to elevate the profile of the CISO. The CISO now has a leadership voice and must use it to instill confidence at the highest levels of the organization and as the foremost executive on the front lines against the threat of systemic risk. A single cyber event can have devastating consequences on an organization's ability to deliver its operational value. CISOs need to have identified the potential ‘showstopper’ risks for their enterprise and ensure that the Board understands the position. Learn from veteran Board members about their journey to the Board room and expectations for understanding cyber risk. 7:45PM - 7:50PM AEST Break 7:50PM - 8:20PM AEST Regulatory landscape in 2022 -------------------------------------------------------------------------------- Managing data privacy risk in a dynamic regulatory environment is challenging. Compounding that is the fact that you have to defend your regulated data against threats inside and outside the organization. You need to put in “appropriate” or “reasonable” security measures, but it is up to you to develop them. Join us for a critical fireside chat with Global regulators. 8:20PM - 8:25PM AEST Break 8:25PM - 8:55PM AEST CISO perspective on cyber insurance -------------------------------------------------------------------------------- Cyber insurance is designed to transfer risks to the insurer. For insurers to be profitable, they must have a fundamental grasp of the risks facing organizations and shifts in the threat landscape. As work becomes increasingly flexible and more solutions move to the cloud, protecting organizations is increasingly challenging. Despite the challenges, Cyber Insurance exists for organizations to help address residual risk. Many organizations are faced with exponential premium increases as they try to understand what cyber insurance actually covers, while others are forced to renew due to contractual obligations or decide to self-insure. This environment creates confusion as organizations ask: does cyber insurance provides risk mitigation or just a measured level of resilience? 8:55PM - 9:00PM AEST Closing Session May 17 | Tue May 18 | Wed DAY 1 SESSION 6:00PM - 6:10PM AEST Protect Opening Message 6:10PM - 6:25PM AEST Proofpoint Welcome Keynote with Ashan Willy, CEO -------------------------------------------------------------------------------- Ashan will provide a company update and share exciting announcements on our people-centric innovations to help you mitigate security and compliance risks. 6:25PM - 6:50PM AEST Customer Panel - Protecting Against the Threat and Risk Actor's Platform -------------------------------------------------------------------------------- Phishing, ransomware, BEC, account compromised suppliers… the list of tools accessible to threat actors continues to both expand and integrate into the modern attacker's platform. Join us in this panel of CISOs to discuss how they counter the threat actor’s attack platform targeting their most valuable asset - their people. 6:50PM - 7:00PM AEST Break and Updates 7:00PM - 7:25PM AEST Customer Panel - Reducing Risk in Information Loss and Cloud Threats -------------------------------------------------------------------------------- With all that's changed in technology, data still doesn't lose itself - malicious, compromised, or careless users lose it. A new people-centric approach is needed to counter data loss - especially with employees working remote and adopting cloud applications. Join this panel of CISOs as they discuss how they counter data loss and reduce insider risk. 7:25PM - 7:55PM AEST The Proofpoint Platforms vs. The Attacker's Platform -------------------------------------------------------------------------------- With risk continuing to converge around people, Proofpoint is helping you keep pace with the visibility, effectiveness, and operational efficiency you need to mitigate those risks. Join this session to hear about Proofpoint’s latest innovations across our threat protection, information protection, and compliance platforms. 7:55PM - 8:00PM AEST Break and Updates 8:00PM - 8:20PM AEST Guest Speaker -------------------------------------------------------------------------------- Our Protect guest speaker will be announced shortly 8:20PM - 8:30PM AEST Closing Session DAY 2 SESSION 6:00PM - 9:00PM AEST Content Tracks Information Protection and Cloud Security Threat Protection Compliance CISO / Thought Leadership 6:00PM - 6:05PM AEST Welcome to Protect - Day 2 6:05PM - 6:35PM AEST Roadmap + Vision: Defending Against Email Threats Targeting Your People 6:35PM - 6:40PM AEST Break 6:40PM - 7:10PM AEST Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss 7:10PM - 7:15PM AEST Break 7:15PM - 7:45PM AEST Solving Real Security Problems - Proofpoint Security Services Edge -------------------------------------------------------------------------------- Proofpoint has integrated technologies such as CASB, SWG, RBI to address the needs of cloud security into what we call Proofpoint Security Services Edge. But let's put aside the technology acronym and join this panel of cloud security experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is uniquely able to solve them. 7:45PM - 7:50PM AEST Break 7:50PM - 8:20PM AEST Reducing Data Loss Risk with Everyone Working Remote and Adopting Cloud Apps -------------------------------------------------------------------------------- Join us in this panel where users of the Proofpoint platform will share how they adopted a people-centric approach to data loss and insider threat and were able to reduce the risk associated with their data. 8:20PM - 8:25PM AEST Break 8:25PM - 8:55PM AEST Practitioner's session: Using the Proofpoint Platform to Reduce Data Loss -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to put into production Proofpoint's Data Loss Prevention platform. 8:55PM - 9:00PM AEST Closing Session 6:00PM - 6:05PM AEST Welcome to Protect - Day 2 6:05PM - 6:35PM AEST Roadmap + Vision: Defending Against Email Threats Targeting Your People 6:35PM - 6:40PM AEST Break 6:40PM - 7:10PM AEST Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss 7:10PM - 7:15PM AEST Break 7:15PM - 7:45PM AEST Countering the Attacker's Platform with the Proofpoint Platform -------------------------------------------------------------------------------- Join us in this panel where Proofpoint users will share their journey adopting and growing their Proofpoint Threat Protection platform - from protecting against email threats, making their end users resilient, fighting against cloud delivered threats. 7:45PM - 7:50PM AEST Break 7:50PM - 8:20PM AEST Expanding Defenses with Email Authentication -------------------------------------------------------------------------------- Join this customer session to learn why and how they implemented email authentication to address the concerns of email impersonation, BEC attacks, supplier risk and application email hygiene aimed at employees, customers and partners. 8:20PM - 8:25PM AEST Break 8:25PM - 8:55PM AEST Practitioner's session: Using the Proofpoint platform to defend against threats -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to counter the attacker's platform and protect your users over email and the cloud. 8:55PM - 9:00PM AEST Closing Session 6:00PM - 6:05PM AEST Welcome to Protect - Day 2 6:05PM - 6:35PM AEST Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap -------------------------------------------------------------------------------- When the next decade of workplace communications relies solely on digital collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for Financial Services and regulated organizations to understand how Proofpoint is staying ahead with you for maximum Compliance and Legal protection 6:35PM - 6:40PM AEST Break 6:40PM - 7:10PM AEST Compliance & Legal Trends in 2022 -------------------------------------------------------------------------------- In the current ever-changing business landscape, join us to learn from industry experts and Proofpoint specialists as they discuss views on Compliance and Legal trends in 2022 and beyond. 7:10PM - 7:15PM AEST Break 7:15PM - 7:45PM AEST Regulatory Guidance on Compliance -------------------------------------------------------------------------------- Join us for a session with a regulatory industry expert to discuss best practices on how regulated organizations monitor and supervise business communications while protecting critical corporate data from insider threats. 7:45PM - 7:50PM AEST Break 7:50PM - 8:20PM AEST Technologies Impacting Litigation Readiness -------------------------------------------------------------------------------- Join us for a session with an experienced legal expert to discuss trends and best practices on building a sound corporate legal protection strategy for organizations with high exposure to litigations. 8:20PM - 8:25PM AEST Break 8:25PM - 8:55PM AEST Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to maximize the impact of your Proofpoint Compliance Platform. 8:55PM - 9:00PM AEST Closing Session 6:00PM - 6:05PM AEST Welcome to Protect - Day 2 6:05PM - 6:35PM AEST Voice of the CISO report -------------------------------------------------------------------------------- Learn what key challenges are facing CISOs across the globe as we unveil the findings of the 2022 Voice of the CISO report. The survey explores three key areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels of employee and organizational preparedness to face them, and the impact of supporting a hybrid workforce as businesses prepare to re-open their corporate offices. It also covers the challenges CISOs face in their roles, position amongst the C-suite, and business expectations of their teams. 6:05PM - 6:35PM AEST Break 6:40PM - 7:10PM AEST What’s Next in People-Centric Security: Roadmap and Overview for Nexus People Risk Explorer (NPRE) -------------------------------------------------------------------------------- Understanding your people-centric risk allows one to better plan and reduce your organization's risk posture. Join us in this session as we discuss with customers how they leverage the Proofpoint Nexus People Risk Explorer to understand risk and activate processes to reduce risk exposure. 7:10PM - 7:15PM AEST Break 7:15PM - 7:45PM AEST Strategies for Board Engagement -------------------------------------------------------------------------------- Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to elevate the profile of the CISO. The CISO now has a leadership voice and must use it to instill confidence at the highest levels of the organization and as the foremost executive on the front lines against the threat of systemic risk. A single cyber event can have devastating consequences on an organization's ability to deliver its operational value. CISOs need to have identified the potential ‘showstopper’ risks for their enterprise and ensure that the Board understands the position. Learn from veteran Board members about their journey to the Board room and expectations for understanding cyber risk. 7:45PM - 7:50PM AEST Break 7:50PM - 8:20PM AEST Regulatory landscape in 2022 -------------------------------------------------------------------------------- Managing data privacy risk in a dynamic regulatory environment is challenging. Compounding that is the fact that you have to defend your regulated data against threats inside and outside the organization. You need to put in “appropriate” or “reasonable” security measures, but it is up to you to develop them. Join us for a critical fireside chat with Global regulators. 8:20PM - 8:25PM AEST Break 8:25PM - 8:55PM AEST CISO perspective on cyber insurance -------------------------------------------------------------------------------- Cyber insurance is designed to transfer risks to the insurer. For insurers to be profitable, they must have a fundamental grasp of the risks facing organizations and shifts in the threat landscape. As work becomes increasingly flexible and more solutions move to the cloud, protecting organizations is increasingly challenging. Despite the challenges, Cyber Insurance exists for organizations to help address residual risk. Many organizations are faced with exponential premium increases as they try to understand what cyber insurance actually covers, while others are forced to renew due to contractual obligations or decide to self-insure. This environment creates confusion as organizations ask: does cyber insurance provides risk mitigation or just a measured level of resilience? 8:55PM - 9:00PM AEST Closing Session May 18 | Wed May 19 | Thu DAY 1 7:00PM - 7:10PM Protect Opening Message 7:10PM - 7:25PM Proofpoint Welcome Keynote with Ashan Willy, CEO -------------------------------------------------------------------------------- Ashan will provide a company update and share exciting announcements on our people-centric innovations to help you mitigate security and compliance risks. 7:25PM - 7:50PM Customer Panel - Protecting Against the Threat and Risk Actor's Platform -------------------------------------------------------------------------------- Phishing, ransomware, BEC, account compromised suppliers… the list of tools accessible to threat actors continues to both expand and integrate into the modern attacker's platform. Join us in this panel of CISOs to discuss how they counter the threat actor’s attack platform targeting their most valuable asset - their people. 7:50PM - 8:00PM Break and Updates 8:00PM - 8:25PM Customer Panel - Reducing Risk in Information Loss and Cloud Threats -------------------------------------------------------------------------------- With all that's changed in technology, data still doesn't lose itself - malicious, compromised, or careless users lose it. A new people-centric approach is needed to counter data loss - especially with employees working remote and adopting cloud applications. Join this panel of CISOs as they discuss how they counter data loss and reduce insider risk. 8:25PM - 8:55PM The Proofpoint Platforms vs. The Attacker's Platform -------------------------------------------------------------------------------- With risk continuing to converge around people, Proofpoint is helping you keep pace with the visibility, effectiveness, and operational efficiency you need to mitigate those risks. Join this session to hear about Proofpoint’s latest innovations across our threat protection, information protection, and compliance platforms. 8:55PM - 9:00PM Break and Updates 9:00PM - 9:20PM Guest Speaker -------------------------------------------------------------------------------- Our Protect guest speaker will be announced shortly 9:20PM - 9:30PM Closing Session DAY 2 12:00PM - 3:00PM AEST Content Tracks Information Protection and Cloud Security Threat Protection Compliance CISO / Thought Leadership 12:00PM - 12:05PM AEST Welcome to Protect - Day 2 12:05PM - 12:35PM AEST Roadmap + Vision: Defending Against Email Threats Targeting Your People 12:35PM - 12:40PM AEST Break 12:40PM - 1:10PM AEST Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss 1:10PM - 1:15PM AEST Break 1:15PM - 1:45PM AEST Solving Real Security Problems - Proofpoint Security Services Edge -------------------------------------------------------------------------------- Proofpoint has integrated technologies such as CASB, SWG, RBI to address the needs of cloud security into what we call Proofpoint Security Services Edge. But let's put aside the technology acronym and join this panel of cloud security experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is uniquely able to solve them. 1:45PM - 1:50PM AEST Break 1:50PM - 2:20PM AEST Reducing Data Loss Risk with Everyone Working Remote and Adopting Cloud Apps -------------------------------------------------------------------------------- Join us in this panel where users of the Proofpoint platform will share how they adopted a people-centric approach to data loss and insider threat and were able to reduce the risk associated with their data. 2:20PM - 2:25PM AEST Break 2:25PM - 2:55PM AEST Practitioner's session: Using the Proofpoint Platform to Reduce Data Loss -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to put into production Proofpoint's Data Loss Prevention platform. 2:55PM - 3:00PM AEST Closing Session 12:00PM - 12:05PM AEST Welcome to Protect - Day 2 12:05PM - 12:35PM AEST Roadmap + Vision: Defending Against Email Threats Targeting Your People 12:35PM - 12:40PM AEST Break 12:40PM - 1:10PM AEST Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss 1:10PM - 1:15PM AEST Break 1:15PM - 1:45PM AEST Countering the Attacker's Platform with the Proofpoint Platform -------------------------------------------------------------------------------- Join us in this panel where Proofpoint users will share their journey adopting and growing their Proofpoint Threat Protection platform - from protecting against email threats, making their end users resilient, fighting against cloud delivered threats. 1:45PM - 1:50PM AEST Break 1:50PM - 2:20PM AEST Expanding Defenses with Email Authentication -------------------------------------------------------------------------------- Join this customer session to learn why and how they implemented email authentication to address the concerns of email impersonation, BEC attacks, supplier risk and application email hygiene aimed at employees, customers and partners. 2:20PM - 2:25PM AEST Break 2:25PM - 2:55PM AEST Practitioner's session: Using the Proofpoint platform to defend against threats -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to counter the attacker's platform and protect your users over email and the cloud. 2:55PM - 3:00PM AEST Closing Session 12:00PM - 12:05PM AEST Welcome to Protect - Day 2 12:05PM - 12:35PM AEST Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap -------------------------------------------------------------------------------- When the next decade of workplace communications relies solely on digital collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for Financial Services and regulated organizations to understand how Proofpoint is staying ahead with you for maximum Compliance and Legal protection 12:35PM - 12:40PM AEST Break 12:40PM - 1:10PM AEST Compliance & Legal Trends in 2022 -------------------------------------------------------------------------------- In the current ever-changing business landscape, join us to learn from industry experts and Proofpoint specialists as they discuss views on Compliance and Legal trends in 2022 and beyond. 1:10PM - 1:15PM AEST Break 1:15PM - 1:45PM AEST Regulatory Guidance on Compliance -------------------------------------------------------------------------------- Join us for a session with a regulatory industry expert to discuss best practices on how regulated organizations monitor and supervise business communications while protecting critical corporate data from insider threats. 1:45PM - 1:50PM AEST Break 1:50PM - 2:20PM AEST Technologies Impacting Litigation Readiness -------------------------------------------------------------------------------- Join us for a session with an experienced legal expert to discuss trends and best practices on building a sound corporate legal protection strategy for organizations with high exposure to litigations. 2:20PM - 2:25PM AEST Break 2:25PM - 2:55PM AEST Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to maximize the impact of your Proofpoint Compliance Platform. 2:55PM - 3:00PM AEST Closing Session 12:00PM - 12:05PM AEST Welcome to Protect - Day 2 12:05PM - 12:35PM AEST Voice of the CISO report -------------------------------------------------------------------------------- Learn what key challenges are facing CISOs across the globe as we unveil the findings of the 2022 Voice of the CISO report. The survey explores three key areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels of employee and organizational preparedness to face them, and the impact of supporting a hybrid workforce as businesses prepare to re-open their corporate offices. It also covers the challenges CISOs face in their roles, position amongst the C-suite, and business expectations of their teams. 12:35PM - 12:40PM AEST Break 12:40PM - 1:10PM AEST What’s Next in People-Centric Security: Roadmap and Overview for Nexus People Risk Explorer (NPRE) -------------------------------------------------------------------------------- Understanding your people-centric risk allows one to better plan and reduce your organization's risk posture. Join us in this session as we discuss with customers how they leverage the Proofpoint Nexus People Risk Explorer to understand risk and activate processes to reduce risk exposure. 1:10PM - 1:15PM AEST Break 1:15PM - 1:45PM AEST Strategies for Board Engagement -------------------------------------------------------------------------------- Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to elevate the profile of the CISO. The CISO now has a leadership voice and must use it to instill confidence at the highest levels of the organization and as the foremost executive on the front lines against the threat of systemic risk. A single cyber event can have devastating consequences on an organization's ability to deliver its operational value. CISOs need to have identified the potential ‘showstopper’ risks for their enterprise and ensure that the Board understands the position. Learn from veteran Board members about their journey to the Board room and expectations for understanding cyber risk. 1:45PM - 1:50PM AEST Break 1:50PM - 2:20PM AEST Regulatory landscape in 2022 -------------------------------------------------------------------------------- Managing data privacy risk in a dynamic regulatory environment is challenging. Compounding that is the fact that you have to defend your regulated data against threats inside and outside the organization. You need to put in “appropriate” or “reasonable” security measures, but it is up to you to develop them. Join us for a critical fireside chat with Global regulators. 2:20PM - 2:25PM AEST Break 2:25PM - 2:55PM AEST CISO perspective on cyber insurance -------------------------------------------------------------------------------- Cyber insurance is designed to transfer risks to the insurer. For insurers to be profitable, they must have a fundamental grasp of the risks facing organizations and shifts in the threat landscape. As work becomes increasingly flexible and more solutions move to the cloud, protecting organizations is increasingly challenging. Despite the challenges, Cyber Insurance exists for organizations to help address residual risk. Many organizations are faced with exponential premium increases as they try to understand what cyber insurance actually covers, while others are forced to renew due to contractual obligations or decide to self-insure. This environment creates confusion as organizations ask: does cyber insurance provides risk mitigation or just a measured level of resilience? 2:55PM - 3:00PM AEST Closing Session May 18 | Wed May 19 | Thu DAY 1 SESSION 12:00PM - 12:10PM AEST Protect Opening Message 12:10PM - 12:25PM AEST Proofpoint Welcome Keynote with Ashan Willy, CEO -------------------------------------------------------------------------------- Ashan will provide a company update and share exciting announcements on our people-centric innovations to help you mitigate security and compliance risks. 12:25PM - 12:50PM AEST Customer Panel - Protecting Against the Threat and Risk Actor's Platform -------------------------------------------------------------------------------- Phishing, ransomware, BEC, account compromised suppliers… the list of tools accessible to threat actors continues to both expand and integrate into the modern attacker's platform. Join us in this panel of CISOs to discuss how they counter the threat actor’s attack platform targeting their most valuable asset - their people. 12:50PM - 1:00PM AEST Break and Updates 1:00PM - 1:25PM AEST Customer Panel - Reducing Risk in Information Loss and Cloud Threats -------------------------------------------------------------------------------- With all that's changed in technology, data still doesn't lose itself - malicious, compromised, or careless users lose it. A new people-centric approach is needed to counter data loss - especially with employees working remote and adopting cloud applications. Join this panel of CISOs as they discuss how they counter data loss and reduce insider risk. 1:25PM - 1:55PM AEST The Proofpoint Platforms vs. The Attacker's Platform -------------------------------------------------------------------------------- With risk continuing to converge around people, Proofpoint is helping you keep pace with the visibility, effectiveness, and operational efficiency you need to mitigate those risks. Join this session to hear about Proofpoint’s latest innovations across our threat protection, information protection, and compliance platforms. 1:55PM - 2:00PM AEST Break and Updates 2:00PM - 2:20PM AEST Guest Speaker -------------------------------------------------------------------------------- Our Protect guest speaker will be announced shortly 2:20PM - 2:30PM AEST Closing Session DAY 2 SESSION 12:00PM - 3:00PM AEST Content Tracks Information Protection and Cloud Security Threat Protection Compliance CISO / Thought Leadership 12:00PM - 12:05PM AEST Welcome to Protect - Day 2 12:05PM - 12:35PM AEST Roadmap + Vision: Defending Against Email Threats Targeting Your People 12:35PM - 12:40PM AEST Break 12:40PM - 1:10PM AEST Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss 1:10PM - 1:15PM AEST Break 1:15PM - 1:45PM AEST Solving Real Security Problems - Proofpoint Security Services Edge -------------------------------------------------------------------------------- Proofpoint has integrated technologies such as CASB, SWG, RBI to address the needs of cloud security into what we call Proofpoint Security Services Edge. But let's put aside the technology acronym and join this panel of cloud security experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is uniquely able to solve them. 1:45PM - 1:50PM AEST Break 1:50PM - 2:20PM AEST Reducing Data Loss Risk with Everyone Working Remote and Adopting Cloud Apps -------------------------------------------------------------------------------- Join us in this panel where users of the Proofpoint platform will share how they adopted a people-centric approach to data loss and insider threat and were able to reduce the risk associated with their data. 2:20PM - 2:25PM AEST Break 2:25PM - 2:55PM AEST Practitioner's session: Using the Proofpoint Platform to Reduce Data Loss -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to put into production Proofpoint's Data Loss Prevention platform. 2:55PM - 3:00PM AEST Closing Session 12:00PM - 12:05PM AEST Welcome to Protect - Day 2 12:05PM - 12:35PM AEST Roadmap + Vision: Defending Against Email Threats Targeting Your People 12:35PM - 12:40PM AEST Break 12:40PM - 1:10PM AEST Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss 1:10PM - 1:15PM AEST Break 1:15PM - 1:45PM AEST Countering the Attacker's Platform with the Proofpoint Platform -------------------------------------------------------------------------------- Join us in this panel where Proofpoint users will share their journey adopting and growing their Proofpoint Threat Protection platform - from protecting against email threats, making their end users resilient, fighting against cloud delivered threats. 1:45PM - 1:50PM AEST Break 1:50PM - 2:20PM AEST Expanding Defenses with Email Authentication -------------------------------------------------------------------------------- Join this customer session to learn why and how they implemented email authentication to address the concerns of email impersonation, BEC attacks, supplier risk and application email hygiene aimed at employees, customers and partners. 2:20PM - 2:25PM AEST Break 2:25PM - 2:55PM AEST Practitioner's session: Using the Proofpoint platform to defend against threats -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to counter the attacker's platform and protect your users over email and the cloud. 2:55PM - 3:00PM AEST Closing Session 12:00PM - 12:05PM AEST Welcome to Protect - Day 2 12:05PM - 12:35PM AEST Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap -------------------------------------------------------------------------------- When the next decade of workplace communications relies solely on digital collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for Financial Services and regulated organizations to understand how Proofpoint is staying ahead with you for maximum Compliance and Legal protection 12:35PM - 12:40PM AEST Break 12:40PM - 1:10PM AEST Compliance & Legal Trends in 2022 -------------------------------------------------------------------------------- In the current ever-changing business landscape, join us to learn from industry experts and Proofpoint specialists as they discuss views on Compliance and Legal trends in 2022 and beyond. 1:10PM - 1:15PM AEST Break 1:15PM - 1:45PM AEST Regulatory Guidance on Compliance -------------------------------------------------------------------------------- Join us for a session with a regulatory industry expert to discuss best practices on how regulated organizations monitor and supervise business communications while protecting critical corporate data from insider threats. 1:45PM - 1:50PM AEST Break 1:50PM - 2:20PM AEST Technologies Impacting Litigation Readiness -------------------------------------------------------------------------------- Join us for a session with an experienced legal expert to discuss trends and best practices on building a sound corporate legal protection strategy for organizations with high exposure to litigations. 2:20PM - 2:25PM AEST Break 2:25PM - 2:55PM AEST Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products -------------------------------------------------------------------------------- Join us for a technical, hands-on session on how to maximize the impact of your Proofpoint Compliance Platform. 2:55PM - 3:00PM AEST Closing Session 12:00PM - 12:05PM AEST Welcome to Protect - Day 2 12:05PM - 12:35PM AEST Voice of the CISO report -------------------------------------------------------------------------------- Learn what key challenges are facing CISOs across the globe as we unveil the findings of the 2022 Voice of the CISO report. The survey explores three key areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels of employee and organizational preparedness to face them, and the impact of supporting a hybrid workforce as businesses prepare to re-open their corporate offices. It also covers the challenges CISOs face in their roles, position amongst the C-suite, and business expectations of their teams. 12:35PM - 12:40PM AEST Break 12:40PM - 1:10PM AEST What’s Next in People-Centric Security: Roadmap and Overview for Nexus People Risk Explorer (NPRE) -------------------------------------------------------------------------------- Understanding your people-centric risk allows one to better plan and reduce your organization's risk posture. Join us in this session as we discuss with customers how they leverage the Proofpoint Nexus People Risk Explorer to understand risk and activate processes to reduce risk exposure. 1:10PM - 1:15PM AEST Break 1:15PM - 1:45PM AEST Strategies for Board Engagement -------------------------------------------------------------------------------- Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to elevate the profile of the CISO. The CISO now has a leadership voice and must use it to instill confidence at the highest levels of the organization and as the foremost executive on the front lines against the threat of systemic risk. A single cyber event can have devastating consequences on an organization's ability to deliver its operational value. CISOs need to have identified the potential ‘showstopper’ risks for their enterprise and ensure that the Board understands the position. Learn from veteran Board members about their journey to the Board room and expectations for understanding cyber risk. 1:45PM - 1:50PM AEST Break 1:50PM - 2:20PM AEST Regulatory landscape in 2022 -------------------------------------------------------------------------------- Managing data privacy risk in a dynamic regulatory environment is challenging. Compounding that is the fact that you have to defend your regulated data against threats inside and outside the organization. You need to put in “appropriate” or “reasonable” security measures, but it is up to you to develop them. Join us for a critical fireside chat with Global regulators. 2:20PM - 2:25PM AEST Break 2:25PM - 2:55PM AEST CISO perspective on cyber insurance -------------------------------------------------------------------------------- Cyber insurance is designed to transfer risks to the insurer. For insurers to be profitable, they must have a fundamental grasp of the risks facing organizations and shifts in the threat landscape. As work becomes increasingly flexible and more solutions move to the cloud, protecting organizations is increasingly challenging. Despite the challenges, Cyber Insurance exists for organizations to help address residual risk. Many organizations are faced with exponential premium increases as they try to understand what cyber insurance actually covers, while others are forced to renew due to contractual obligations or decide to self-insure. This environment creates confusion as organizations ask: does cyber insurance provides risk mitigation or just a measured level of resilience? 2:55PM - 3:00PM AEST Closing Session INTERESTED IN LEARNING MORE ABOUT SECURITY AWARENESS? Join us May 19, 2022 for Wisdom 2022. Learn More ABOUT * Overview * Careers * Leadership Team * News Center * Nexus Platform THREAT CENTER * Human Factor Report * Threat Glossary * Daily Ruleset PRODUCTS * Email Protection * Advanced Threat Protection * Archive & Compliance * Information Protection * Digital Risk Protection RESOURCES * White Papers * Webinars * Data Sheets * Customer Stories * Blog * Free Trial CONNECT * +61 2 8378 4250 * Contact Us * Office Locations * Request a Demo SUPPORT * Support Login * Support Services * IP Address Blocked? * Facebook * Twitter * linkedin * Youtube * United States * United Kingdom * France * Germany * Italy * Spain * Japan * Australia © 2022. All rights reserved. Terms and conditions Privacy Policy Sitemap